The Leading AI Headshot Generator for Professionals
Security Policy
How we protect
your data
This page describes the technical and organizational measures Aragon implements to protect the data of our business customers and their end users.
Overview
At Aragon, we take the protection of customer data extremely seriously. This Security Policy describes the organizational and technical measures Aragon implements platform-wide, designed to prevent unauthorized access, use, alteration, or disclosure of customer data. Aragon services operate on Amazon Web Services, Heroku, and Vercel. Our team includes engineers who have led the design, build, and operation of highly secure Internet-facing systems at companies ranging from startups to large public companies.
01
Access Control
Access to systems that process Customer Personal Data operates on a principle of least privilege — rights are scoped to job function and revoked promptly when no longer required.
Role-based access
Access is granted only to personnel who require it for their role, and reviewed regularly.
Multi-factor authentication
MFA is enforced on key systems and cloud services used to operate the platform, including GitHub, AWS, Heroku, and Vercel.
Session controls
Automatic session timeouts are enforced. Access is terminated promptly upon role changes or departures.
Strong password policies
Strong password requirements are enforced across all tools and systems used to operate the platform.
02
Encryption
All Customer Personal Data is encrypted in transit and at rest. Aragon services are served exclusively over HTTPS.
- Data in transit is encrypted using TLS 1.2 or higher.
- Data at rest is encrypted using AES-256.
- All API and application endpoints are TLS/SSL only.
03
Network Security
Cloud infrastructure is protected by multiple layers of network-level controls.
- Firewalls and intrusion detection systems protect all service boundaries.
- Network segmentation isolates systems that process Customer Personal Data.
04
Vulnerability Management
Aragon takes a proactive approach to identifying and remediating vulnerabilities.
- Automated vulnerability scanning runs continuously across production systems.
- Findings are triaged and remediated by severity.
- Periodic penetration testing is conducted by independent security professionals.
05
Incident Response
Aragon maintains a formal incident response plan. All personnel are trained on escalation procedures.
- Security events are escalated and triaged upon detection. Application monitoring (via Sentry) provides continuous visibility across all services.
- Confirmed incidents result in a written post-mortem, reviewed across the organization, with documented action items.
- Aragon will promptly notify customers in writing upon verification of a security breach affecting their data, including the status of Aragon's investigation.
06
Infrastructure & Continuity
Aragon runs entirely in the cloud. We do not operate physical servers, routers, or load balancers. Physical controls are governed by our infrastructure providers' own certifications. Customer Personal Data is hosted on AWS and Heroku, which runs on AWS infrastructure (us-east-1).
Customer data is stored in multi-tenant datastores with strict logical separation enforced in application code. Continuity measures include regular automated backups, a tested disaster recovery plan, and redundant infrastructure.
07
Personnel
All personnel authorized to access Customer Personal Data are bound by confidentiality obligations and receive data protection training appropriate to their role. Disciplinary procedures apply to any unauthorized access or disclosure. Access is revoked promptly upon role change or departure.
08
Payment Security
Aragon does not store payment card data. All payment processing is handled directly by Stripe, Paddle, and RevenueCat (for mobile in-app purchases).
09
Customer Responsibilities
Customers are responsible for the following within their use of the Services. Full obligations are set out in the Customer Service Agreement.
- Managing user accounts and End User access within their organization, including timely deprovisioning when access is no longer required.
- Protecting account credentials and the email addresses associated with accessing Aragon services.
- Ensuring use of the Services complies with the Agreement and applicable law, including with respect to authorized End Users.
- Notifying Aragon promptly if a user credential is compromised or if suspicious activity is detected that may affect the security of Customer's account.
- Not performing penetration tests or security assessments on Aragon systems without Aragon's express advance written consent.
Contact
Security Contact
For security questions or concerns, contact us directly.
Aragon AI, Inc. — Security Department
440 N Barranca Ave #4760, Covina, CA 91723
support@aragon.ai












